{"id":7704,"date":"2026-03-24T09:00:52","date_gmt":"2026-03-24T09:00:52","guid":{"rendered":"https:\/\/locaterisk.com\/?p=7704"},"modified":"2026-03-25T07:47:41","modified_gmt":"2026-03-25T07:47:41","slug":"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview","status":"publish","type":"post","link":"https:\/\/locaterisk.com\/de\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","title":{"rendered":"Lukas Baumann im CIO Views Magazine Portrait"},"content":{"rendered":"\r\n<div class=\"wp-block-lr-blog-article-header-module\">\r\n    <div class=\"content\">\r\n\t\t<div class=\"headline\">\r\n\t\t\t<button class=\"to-blog-button\">Back to blog                <a href=\"https:\/\/locaterisk.com\/de\/blog\/\"><\/a>\r\n\t\t\t<\/button>\r\n\t\t\t\t\t<\/div>\r\n        <div class=\"main-content\">\r\n\t\t\t\t\t\t<!--\r\n            <div class=\"header\">\r\n                <h6> <\/h6>\r\n            <\/div>\r\n\t\t\t\t\t\t-->\r\n            <h1 class=\"title\">Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert.<\/h1>\r\n            <p class=\"paragraph\"><br>Cyber-Bedrohungen k\u00fcndigen sich selten an. Sie verweilen oft lautlos in \u00fcbersehenen Schwachstellen, exponierten Systemen oder vergessenen digitalen Assets, bis sie identifiziert werden. F\u00fcr Lukas Baumann, CEO von LocateRisk, ist diese mangelnde \u00dcbersicht eines der gr\u00f6\u00dften Sicherheitsrisiken moderner Unternehmen. Im aktuellen Feature der <strong><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">CIO Views<\/a><\/strong> erl\u00e4utert er, warum proaktives Handeln und technische Fakten die Basis f\u00fcr eine belastbare Cybersecurity bilden m\u00fcssen.<\/p>\r\n        <\/div>\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"540\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png\" alt=\"\" class=\"wp-image-7795\" style=\"object-fit:cover;width:842px;height:auto\" srcset=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas.png 960w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-300x169.png 300w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-768x432.png 768w, https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Gruppenbild-und-Lukas-18x10.png 18w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><figcaption class=\"wp-element-caption\">CEO von LocateRisk Lukas Baumann und sein Team<\/figcaption><\/figure><\/div>\n\n\n<p>Traditionelle Sicherheitsans\u00e4tze konzentrieren sich h\u00e4ufig auf interne Kontrollen und Compliance. Dabei wird jedoch oft vernachl\u00e4ssigt, wie die eigene Infrastruktur aus der Perspektive eines externen Angreifers aussieht. Lukas Baumann verfolgt das Ziel, diese verborgenen Risiken messbar zu machen und Risiken pr\u00e4ventiv zu minimieren. Durch Automatisierung und Skalierbarkeit wird Cybersecurity so von einem reaktiven zu einem proaktiven Prozess.<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>EASM: Externe Angriffsfl\u00e4chen durch Automatisierung kontrollieren<\/strong><\/strong><\/h3>\n\n\n\n<p> Der Mangel an \u00dcbersicht \u00fcber die eigene Angriffsfl\u00e4che ist eine der zentralen Schwachstellen in vielen Organisationen. LocateRisk erm\u00f6glicht mit kontinuierlichem IT-Risikomonitoring eine m\u00fchelose Bewertung und \u00dcberwachung der eigenen externen IT-Infrastruktur.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automatisierung<\/strong>: Wiederkehrende Audits liefern ein kontinuierliches Bild der digitalen Exposition.<\/li>\n\n\n\n<li><strong>Pr\u00e4zision<\/strong>: Statt theoretischer Modelle stehen technische Fakten im Vordergrund.<\/li>\n\n\n\n<li><strong>Skalierbarkeit<\/strong>: Die L\u00f6sungen funktionieren branchen\u00fcbergreifend f\u00fcr Organisationen jeder Gr\u00f6\u00dfe.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Effizienz: Zeitersparnis durch KI-gest\u00fctzte Workflows<\/strong><\/strong><\/h3>\n\n\n\n<p> In der Cybersecurity ist Geschwindigkeit ein entscheidender Faktor, um Sch\u00e4den zu begrenzen oder zu verhindern. LocateRisk nutzt Technologie, um Entscheidungsprozesse zu beschleunigen.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>KI-Integration<\/strong>: K\u00fcnstliche Intelligenz wird fest in die t\u00e4glichen Abl\u00e4ufe eingebunden, bis sie zum Standard wird.<\/li>\n\n\n\n<li><strong>Entlastung<\/strong>: Automatisierte Analysen unterst\u00fctzen Teams dabei, Informationen schneller zu verarbeiten, ohne sie zu \u00fcberfordern.<\/li>\n\n\n\n<li><strong>Prozessorientierung<\/strong>: Expertise ist direkt in Abl\u00e4ufe integriert und nicht von einzelnen Personen abh\u00e4ngig.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><strong>Vendor Risk Management: Sicherheit im gesamten Partner-\u00d6kosystem<\/strong><\/strong><\/h3>\n\n\n\n<p>Die Sicherheit eines Unternehmens endet nicht an den eigenen Netzwerkgrenzen, sondern schlie\u00dft Gesch\u00e4ftspartner- und Zulieferer ein.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Drittanbieter-Monitoring<\/strong>: Kontinuierliche Einblicke in die Sicherheitslage der Zulieferer reduzieren das Risiko durch die Lieferkette.<\/li>\n\n\n\n<li><strong>Handlungsorientierung<\/strong>: Es werden Werkzeuge bereitgestellt, um identifizierte Schwachstellen direkt zu adressieren. \u2192 Mehr zum <a href=\"https:\/\/locaterisk.com\/de\/landing\/vendor-risk-management-leicht-gemacht\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/easm\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vendor Risk Management \u00b7 VRM<\/a><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Standardisierung trifft konkrete Handlungsempfehlungen<\/strong><\/h3>\n\n\n\n<p>Die einzelne Analyse der IT-Sicherheit ist nur eine Momentaufnahme. Lukas Baumann betont, dass erst kontinuierliche \u00dcberpr\u00fcfung und die Behebung der gefundenen M\u00e4ngel einen messbaren Sicherheitsgewinn bringt.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Standardisierung<\/strong>: Das Ziel ist die Etablierung eines Standards f\u00fcr Security Ratings.<\/li>\n\n\n\n<li><strong>Ergebnisfokus<\/strong>: Die Plattform filtert irrelevante Informationen heraus und liefert konkrete Ans\u00e4tze zur Problembehebung. \u2192 Erfahren Sie mehr \u00fcber<a href=\"https:\/\/www.google.com\/search?q=https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\"> <\/a><a href=\"https:\/\/locaterisk.com\/de\/landing\/it-risikoanalyse\/\" type=\"link\" id=\"https:\/\/www.locaterisk.com\/de\/it-risikomanagement\/\" target=\"_blank\" rel=\"noreferrer noopener\">die IT-Risikoanalyse und Monitoring von LocateRisk<\/a><\/li>\n<\/ul>\n\n\n\n<p><span style=\"display:inline-flex; align-items:center;\"><br><img decoding=\"async\" class=\"wp-image-6345\" style=\"width: 150px; margin-right: 12px;\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Award-Logo-CIO-Views.png\" alt=\"\"><br>    <span style=\"display:inline-block;\"><strong>Link zum Artikel in CIO Views<\/strong><br><a href=\"https:\/\/cioviews.com\/lukas-baumann-making-the-invisible-risks-of-the-digital-world-visible\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lukas Baumann: Making the Invisible Risks of the Digital World Visible<\/a><br>    <\/span><br>  <\/span><\/p>\n\n\n\n<div class=\"wp-block-lr-faq-module\"><div class=\"content\"><h3><strong>Technisches FAQ: <strong>Externes Angriffsfl\u00e4chenmanagement<\/strong><\/strong><\/h3><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Warum ist die externe Sicht auf die IT-Sicherheit entscheidend?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Interne Kontrollen erfassen oft nicht, wie die Infrastruktur f\u00fcr Angreifer aussieht. Eine externe Analyse deckt exponierte Assets und vergessene Systeme auf, die ein Sicherheitsrisiko darstellen.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Wie verbessert Automatisierung die Cybersecurity-Prozesse?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Automatisierung erm\u00f6glicht skalierbare und wiederkehrende Analysen, die schneller als manuelle Audits auf Ver\u00e4nderungen reagieren. Dies entlastet Teams und stellt sicher, dass Expertise konsistent angewendet wird.<\/p><\/div><\/div><div class=\"faq-topic\"><hr\/><div class=\"collapsible-title\"><a class=\"pr-4\"><strong><strong>Welche Rolle spielt KI bei der Beschleunigung des IT-Sicherheitsprozesses?<\/strong><\/strong><\/a><img class=\"collapse-toggle\" srcset=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@3x.png 3x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus@2x.png 2x,https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/faq-module\/img\/ic-plus.png 1x\"\/><\/div><div class=\"collapsible-content\"><p class=\"font-normal\">Dank MCP-\ud835\udde6\ud835\uddf0\ud835\uddf5\ud835\uddfb\ud835\uddf6\ud835\ude01\ud835\ude01\ud835\ude00\ud835\ude01\ud835\uddf2\ud835\uddf9\ud835\uddf9\ud835\uddf2 (Model Context Protocol) k\u00f6nnen Unternehmen \u00fcber Ihre bevorzugten KI-Modelle auf die Analysedaten und Filterfunktionen in der Plattform zugreifen. Das verk\u00fcrzt die Zeitspanne zwischen Erkennung und Behebung auf ein Minimum.<\/p><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-lr-contact-post-module\">\n\t<div id=\"lr-contact-form\" class=\"wp-block-lr-contact-post-module\">\n\t\t<div id=\"formular\" class=\"content\">\n\t\t\t<div class=\"inner-content\">\n\t\t\t\t<div class=\"column-2 feature-mode\">\n\t\t\t\t\t<h2><br>Fragen Sie jetzt Ihre pers\u00f6nliche Live-Demo an<\/h2>\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t\t\t<p class=\"margin-b-36\">Erkennen und reduzieren Sie Ihre Cyberrisiken durch einen vergleichbaren und verst\u00e4ndlichen \u00dcberblick Ihrer IT-Sicherheit. Lassen Sie sich von unseren Experten beraten und finden Sie heraus, wie LocateRisk Ihnen bei der L\u00f6sung Ihrer Cyberrisiken helfen kann.<\/p>\n\t\t\t\t\t\t\t<\/div>\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div> \n\t\t\t\t<div class=\"column-2\">\n\t\t\t\t\t<form action=\"\" class=\"form\" method=\"post\" role=\"form\" novalidate >\n\t\t\t\t\t\t<input type=\"text\" id=\"successmessage\" name=\"successmessage\" value=\"Ihre Registrierung war erfolgreich Ihre Anfrage wurde erfolgreich versendet. Wir haben Ihnen soeben eine Best\u00e4tigungsmail mit einem Aktivierungs-Link zugesendet, um einem Missbrauch Ihrer E-Mail Adresse durch Dritte vorzubeugen. Die Mail wird von sales@locaterisk.com versendet und sollte sich i n wenigen Minuten in Ihrem Posteingang finden.\" hidden\/>\n\t\t\t\t\t\t<input type=\"text\" id=\"errormessage\" name=\"errormessage\" value=\"Da ist wohl etwas schief gelaufen. Bitte probieren Sie es erneut oder nehmen Sie direkt mit uns Kontakt auf\" hidden\/>\n\t\t\t\t\t\t<input type=\"text\" id=\"slug\" name=\"slug\" value=\"it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\" hidden\/>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"name\"\n\t\t\t\t\t\t\t\tname=\"name\"\n\t\t\t\t\t\t\t\tplaceholder=\"Vorname\"\n\t\t\t\t\t\t\t\trequired \n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\t\tid=\"surname\"\n\t\t\t\t\t\t\t\tname=\"surname\"\n\t\t\t\t\t\t\t\tplaceholder=\"Nachname\"\n\t\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"email\"\n\t\t\t\t\t\t\tid=\"email\"\n\t\t\t\t\t\t\tname=\"email\"\n\t\t\t\t\t\t\tplaceholder=\"E-Mail\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\n\t\t\t\t\t\t<input\n\t\t\t\t\t\t\ttype=\"text\"\n\t\t\t\t\t\t\tid=\"phone\"\n\t\t\t\t\t\t\tname=\"phone\"\n\t\t\t\t\t\t\tplaceholder=\"Telefon\"\n\t\t\t\t\t\t\trequired\n\t\t\t\t\t\t\tmaxlength=\"50\"\/>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t<h6 class=\"error-message\" hidden>...<\/h6>\n\t\t\t\t\t\t<div class=\"checkbox_container\">\n\t\t\t\t\t\t\t<div class=\"checkbox\">\n\t\t\t\t\t\t\t\t<input\n\t\t\t\t\t\t\t\t\ttype=\"checkbox\"\n\t\t\t\t\t\t\t\t\tid=\"checkbox\"\n\t\t\t\t\t\t\t\t\tname=\"checkbox\" \/>\n\n\t\t\t\t\t\t\t\t<label for=\"checkbox\"><\/label>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<p>Ich bin mit den <a href=\"https:\/\/locaterisk.com\/datenschutz\/\">Datenschutzbestimmungen<\/a> einverstanden<\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div class=\"g-recaptcha\" data-sitekey=\"6LdErNoZAAAAAD1Re2jNxtDFfcDaL9iED5MRBzjR\" data-callback=\"verifyRecaptchaCallback\" data-expired-callback=\"expiredRecaptchaCallback\"><\/div>\n\t\t\t\t\t<input type=\"hidden\" name=\"g-recaptcha-response\" data-recaptcha \/>\n\n\t\t\t\t\t\t<button class=\"lr-button-link\" type=\"submit\"> Demo anfragen<\/button>\n\t\t\t\t\t<\/form>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n\t\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-lr-contact-module\"><div class=\"content\"><h2>Mehr erfahren, Demo buchen oder einfach mal kurz austauschen? Wir freuen uns!<\/h2><div class=\"contact-info-row\"><div class=\"contact-person-info\"><div class=\"avatar\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2025\/06\/Lukas_Baumann_LocateRisk-300.png\"><\/div><p><span class=\"text before\">Ihr Ansprechpartner<\/span><span class=\"bold name\"><strong>Lukas<\/strong><\/span> <span class=\"lastname\"><strong>Baumann<strong><\/strong><\/strong><\/span><strong><strong><span class=\"separator\"><\/span><span class=\"role\">CEO<\/span><\/strong><\/strong><\/p><\/div><p class=\"bold phone\"><strong><strong>+49 6151 6290246<\/strong><\/strong><\/p><strong><strong><a class=\"pr-1\" href=\"mailto: sales@locaterisk.com\">Jetzt Kontakt aufnehmen<\/a><\/strong><\/strong><\/div><\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-lr-footer-module lr-footer-block\"><div class=\"content\"><div class=\"column0\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/plugins\/locate-risk-prod\/lr-blocks\/assets\/img\/lr-logo.svg\"\/><\/div><div class=\"categories\"><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/locaterisk.com\/\">Home<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/blog\">Blog<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/about\">\u00dcber uns<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/kontakt\">Kontakt<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/impressum\">Impressum<\/a><\/div><div class=\"categories-break\"><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/datenschutz\">Datenschutz<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/agb.pdf\">AGB<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/jobs\">Jobs<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"\/files\/sec-information.pdf\">Security<\/a><\/div><div class=\"categories-element\"><a class=\"pr-4\" href=\"https:\/\/app.secfix.com\/trust\/locaterisk\/d1e7d433b33643aea1880bfbfeab9f60\">Trust Center<\/a><\/div><\/div><div class=\"social\"><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/10\/gruppe-230@3x.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/www.instagram.com\/locaterisk\/\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Instagram.png\"\/><\/a><\/div><div class=\"social-element\"><a target=\"_blank\" href=\"https:\/\/twitter.com\/locaterisk\"><img decoding=\"async\" src=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/twitter.png\"\/><\/a><\/div><\/div><div class=\"description\"><h6>\u00a9 LocateRisk 2026<\/h6><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Das Unsichtbare sichtbar zu machen \u2013 das ist es, was uns bei der LocateRisk GmbH antreibt. Lukas Baumann im CIO Views Magazine Portrait.<\/p>\n","protected":false},"author":17,"featured_media":7870,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[95,103,94,18,92,97,98,91,100,4,8,88,44,69,93,102,89,90,96,99,101],"class_list":["post-7704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogpost","tag-automatisierter-scan-vergleich-it-sicherheit","tag-cio-views","tag-cyber-vendor-risk-management","tag-cybersecurity","tag-easm","tag-easm-tool-mit-mcp-support","tag-effizienzsteigerung-it-security-analyst","tag-external-attack-surface-management","tag-it-risikoanalyse","tag-it-sicherheit","tag-it-sicherheitsanalysen","tag-ki-native-sicherheitsanalyse","tag-lieferanten-risikomanagement","tag-lieferantenbewertung","tag-locaterisk","tag-lukas-baumann","tag-mcp-schnittstelle","tag-model-context-protocol","tag-sicherheits-reporting-automatisieren-ki","tag-supply-chain-risk-management-nis-2","tag-vendor-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lukas Baumann im CIO Views Magazine Portrait - LocateRisk<\/title>\n<meta name=\"description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/locaterisk.com\/de\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\" \/>\n<meta property=\"og:description\" content=\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/locaterisk.com\/de\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/\" \/>\n<meta property=\"og:site_name\" content=\"LocateRisk\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-24T09:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T07:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png\" \/>\n\t<meta property=\"og:image:width\" content=\"635\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shaima Luc\u00eda El Qaouti\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"13\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"author\":{\"name\":\"Shaima Luc\u00eda El Qaouti\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\"},\"headline\":\"Lukas Baumann im CIO Views Magazine Portrait\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"},\"wordCount\":674,\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"keywords\":[\"Automatisierter Scan-Vergleich IT-Sicherheit\",\"CIO Views\",\"Cyber Vendor Risk Management\",\"Cybersecurity\",\"EASM\",\"EASM Tool mit MCP-Support\",\"Effizienzsteigerung IT-Security-Analyst\",\"External Attack Surface Management\",\"IT-Risikoanalyse\",\"IT-Sicherheit\",\"IT-Sicherheitsanalysen\",\"KI-native Sicherheitsanalyse\",\"Lieferanten-Risikomanagement\",\"Lieferantenbewertung\",\"LocateRisk\",\"Lukas Baumann\",\"MCP-Schnittstelle\",\"Model Context Protocol\",\"Sicherheits-Reporting automatisieren KI\",\"Supply Chain Risk Management NIS-2\",\"Vendor Risk Management\"],\"articleSection\":[\"Blog post\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\",\"name\":\"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"datePublished\":\"2026-03-24T09:00:52+00:00\",\"dateModified\":\"2026-03-25T07:47:41+00:00\",\"description\":\"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#primaryimage\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/Lukas-Baumann-CIO-Views-Award.png\",\"width\":635,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/locaterisk.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lukas Baumann im CIO Views Magazine Portrait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"name\":\"LocateRisk\",\"description\":\"IT-Sicherheit messen und vergleichen\",\"publisher\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#organization\",\"name\":\"LocateRisk\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"contentUrl\":\"https:\\\/\\\/locaterisk.com\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Kettenglieder_V0216-9.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"LocateRisk\"},\"image\":{\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/locaterisk\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/locaterisk.com\\\/de\\\/#\\\/schema\\\/person\\\/db0ff14304cd2bcafbc27d3c7d470cc7\",\"name\":\"Shaima Luc\u00eda El Qaouti\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g\",\"caption\":\"Shaima Luc\u00eda El Qaouti\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/locaterisk.com\/de\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_locale":"de_DE","og_type":"article","og_title":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","og_description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","og_url":"https:\/\/locaterisk.com\/de\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","og_site_name":"LocateRisk","article_published_time":"2026-03-24T09:00:52+00:00","article_modified_time":"2026-03-25T07:47:41+00:00","og_image":[{"width":635,"height":500,"url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","type":"image\/png"}],"author":"Shaima Luc\u00eda El Qaouti","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Shaima Luc\u00eda El Qaouti","Gesch\u00e4tzte Lesezeit":"13\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#article","isPartOf":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"author":{"name":"Shaima Luc\u00eda El Qaouti","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7"},"headline":"Lukas Baumann im CIO Views Magazine Portrait","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"},"wordCount":674,"publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","keywords":["Automatisierter Scan-Vergleich IT-Sicherheit","CIO Views","Cyber Vendor Risk Management","Cybersecurity","EASM","EASM Tool mit MCP-Support","Effizienzsteigerung IT-Security-Analyst","External Attack Surface Management","IT-Risikoanalyse","IT-Sicherheit","IT-Sicherheitsanalysen","KI-native Sicherheitsanalyse","Lieferanten-Risikomanagement","Lieferantenbewertung","LocateRisk","Lukas Baumann","MCP-Schnittstelle","Model Context Protocol","Sicherheits-Reporting automatisieren KI","Supply Chain Risk Management NIS-2","Vendor Risk Management"],"articleSection":["Blog post"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","url":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/","name":"Lukas Baumann im CIO Views Magazine Portrait - LocateRisk","isPartOf":{"@id":"https:\/\/locaterisk.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"image":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage"},"thumbnailUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","datePublished":"2026-03-24T09:00:52+00:00","dateModified":"2026-03-25T07:47:41+00:00","description":"Das Unsichtbare sichtbar machen \u2013 das CIO Views Magazine hat den Weg von LocateRisk portraitiert. Hier erfahren Sie mehr dar\u00fcber.","breadcrumb":{"@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#primaryimage","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2026\/03\/Lukas-Baumann-CIO-Views-Award.png","width":635,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/locaterisk.com\/it-risikoanalyse-automatisieren-lukas-baumann-von-locaterisk-im-interview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/locaterisk.com\/"},{"@type":"ListItem","position":2,"name":"Lukas Baumann im CIO Views Magazine Portrait"}]},{"@type":"WebSite","@id":"https:\/\/locaterisk.com\/de\/#website","url":"https:\/\/locaterisk.com\/de\/","name":"LocateRisk","description":"IT-Sicherheit messen und vergleichen","publisher":{"@id":"https:\/\/locaterisk.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/locaterisk.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/locaterisk.com\/de\/#organization","name":"LocateRisk","url":"https:\/\/locaterisk.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","contentUrl":"https:\/\/locaterisk.com\/wp-content\/uploads\/2020\/11\/Kettenglieder_V0216-9.jpg","width":1920,"height":1080,"caption":"LocateRisk"},"image":{"@id":"https:\/\/locaterisk.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/locaterisk\/"]},{"@type":"Person","@id":"https:\/\/locaterisk.com\/de\/#\/schema\/person\/db0ff14304cd2bcafbc27d3c7d470cc7","name":"Shaima Luc\u00eda El Qaouti","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb956284b43b183c7cfa2d25e2447ecac2faeabdbe5028327c0c035e44259958?s=96&d=mm&r=g","caption":"Shaima Luc\u00eda El Qaouti"}}]}},"_links":{"self":[{"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/posts\/7704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/comments?post=7704"}],"version-history":[{"count":51,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/posts\/7704\/revisions"}],"predecessor-version":[{"id":7869,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/posts\/7704\/revisions\/7869"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/media\/7870"}],"wp:attachment":[{"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/media?parent=7704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/categories?post=7704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/locaterisk.com\/de\/wp-json\/wp\/v2\/tags?post=7704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}